EP2797295B1 - Procédé, dispositif et système de traduction d'adresse réseau - Google Patents
Procédé, dispositif et système de traduction d'adresse réseau Download PDFInfo
- Publication number
- EP2797295B1 EP2797295B1 EP12875063.5A EP12875063A EP2797295B1 EP 2797295 B1 EP2797295 B1 EP 2797295B1 EP 12875063 A EP12875063 A EP 12875063A EP 2797295 B1 EP2797295 B1 EP 2797295B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data center
- nat
- network address
- mapping entry
- nat mapping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Not-in-force
Links
- 238000000034 method Methods 0.000 title claims description 34
- 238000013519 translation Methods 0.000 title claims description 23
- 238000013507 mapping Methods 0.000 claims description 269
- 238000013508 migration Methods 0.000 claims description 109
- 230000005012 migration Effects 0.000 claims description 109
- 238000012795 verification Methods 0.000 claims description 25
- 230000004044 response Effects 0.000 claims description 24
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2575—NAT traversal using address mapping retrieval, e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
- H04L61/2532—Clique of NAT servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/4557—Distribution of virtual machine instances; Migration and load balancing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2514—Translation of Internet protocol [IP] addresses between local and global IP addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
- H04L61/2528—Translation at a proxy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a system for network address translation.
- a network address translation (English: Network Address Translation, NAT for short) technology belongs to a technology for accessing a wide area network and is a translation technology for translating a private address/port into a public address/port. It is widely applied in various network access manners and various networks.
- a virtual machine (English: Virtual Machine, VM for short) may be migrated among different data centers, and a NAT mapping entry that the VM has applied is migrated accordingly.
- a NAT mapping entry that the VM has applied is migrated accordingly; however, because the NAT mapping entry of the VM is used still through the first data center but the migrated VM is located in the second data center, the VM needs to perform information exchange with the first data center through the second data center when using the NAT mapping entry.
- the VM is prone to a release attack of an attacker. For example, when the VM is using a certain address, the attacker sends, to the first data center, a message for requesting a release of the address, which affects the VM that is using the address.
- a normal application of the VM may be affected because too many VMs are migrated to the second data center, which goes beyond planning performed by the second data center on NAT address resources.
- Embodiments of the present invention provide a method, an apparatus, and a system for network address translation, so that a NAT control apparatus performs centralized control over each data center to properly plan NAT address resources in each data center and solve a release attack problem caused by a fact that applying and using of a VM are not performed in a same data center.
- the present invention provides a method for network address translation, which is applied in a scenario where a virtual machine is migrated across data centers and includes:
- the method further includes:
- the method further includes:
- the private network address comprises: a private IP address, or a private IP address and a private port number
- the public network address comprises: a public IP address, or a public IP address and a public port number
- the present invention provides a NAT control apparatus, which is applied in a scenario where a virtual machine is migrated across data centers and includes:
- the apparatus further includes:
- the apparatus further includes:
- the private network address comprises: a private IP address, or a private IP address and a private port number
- the public network address comprises: a public IP address, or a public IP address and a public port number
- the present invention provides a system for network address translation, which is applied in a scenario where a virtual machine is migrated across data centers and includes a NAT control apparatus, a first data center, and a second data center, where:
- a NAT control apparatus performs centralized control over each data center to properly plan NAT address resources in each data center; meanwhile, the NAT control apparatus records home information of a NAT mapping entry corresponding to the VM, thereby solving a release attack problem caused by a fact that applying and using of the VM are not performed in a same data center.
- An embodiment of the present invention provides a method for network address translation, and as shown in FIG. 1 , the method is applied in a scenario where a VM is migrated across data centers.
- the method is executed by a NAT control apparatus and includes the following steps:
- the following three cases where the VM is migrated from the first data center to the second data center mainly exist:
- That the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center may specifically be as follows: An NCenter triggers a gateway of the first data center to migrate the NAT mapping entry corresponding to the migrated VM to a gateway of the second data center.
- the network address migration message carries the NAT mapping entry, and the NAT mapping entry records a mapping between a private network address and a public network address of the VM, where the private network address can be used only on a local area network and cannot be used on a wide area network, and the public network address can be used on a wide area network and can also be used on a local area network. Therefore, when the VM accesses a wide area network from a local area network, a private network address of a packet that is sent by the VM needs to be translated into a public network address.
- the NAT control apparatus may receive the network address migration message sent by the first data center and verify the network address migration message with the second data center. Specifically, after receiving the network address migration message, the NAT control apparatus sends a verification request message to the second data center, and the second data center sends a verification response message to the NAT control apparatus after confirming that the NAT mapping entry has been migrated to the second data center. After the NAT control apparatus updates home information of the NAT mapping entry in a network address mapping table from the first data center to the second data center according to the network address migration message, the NAT control apparatus sends a migration confirmation message to the first data center to confirm that migration of the NAT mapping entry is completed.
- the NAT control apparatus may receive the network address migration message sent by the second data center and verify the network address migration message with the first data center. Specifically, after receiving the network address migration message, the NAT control apparatus sends a verification request message to the first data center, and the first data center sends a verification response message to the NAT control apparatus after confirming that the NAT mapping entry has been migrated out of the first data center. After the NAT control apparatus updates home information of the NAT mapping entry in a network address mapping table from the first data center to the second data center according to the network address migration message, the NAT control apparatus sends a migration confirmation message to the second data center to confirm that migration of the NAT mapping entry is completed.
- a mechanism that the NAT control apparatus receives the network address migration message (the NAT control apparatus receives the network address migration message from the first data center or from the second data center) is preset in a whole system for network address translation.
- the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center may be as follows: The first data center sends the NAT mapping entry to the second data center and deletes the NAT mapping entry, and the second data center adds the NAT mapping entry.
- the VM accesses a wide area network from a local area network and in a case where the first data center receives a first packet sent by the VM, a private network address of the packet needs to be translated into a corresponding public network address, and the NAT control apparatus allocates the corresponding public network address for the private network address of the packet.
- the method further includes:
- the first data center may set a second timer for the NAT mapping entry, and the second timer records a preset time.
- the second timer starts when the first data center does not detect a session connection corresponding to the NAT mapping entry, and stops when the preset time is reached or expires.
- the second timer reaches or exceeds the preset time; it indicates that the VM has not sent or received a packet for a long time, and the NAT mapping entry corresponding to the VM is released in time, thereby saving system resources.
- the second timer is reset.
- the NAT control apparatus updates home information of the NAT mapping entry in a network address mapping table from the first data center to the second data center after successfully verifying the network address migration message.
- the network address mapping table records the NAT mapping entry and the home information of the NAT mapping entry.
- the home information of the NAT mapping entry is updated from the first data center to the second data center, that is, the updated NAT mapping entry is homed in the second data center.
- the method further includes: releasing the NAT mapping entry.
- a process for releasing the NAT mapping entry is as follows:
- the first timer records the preset time. In a case where the VM does not send or receive a packet in a certain subsequent moment, the first timer starts when the second data center does not detect a session connection corresponding to the NAT mapping entry, and stops when the preset time is reached or expires. When the first timer reaches or exceeds the preset time, it indicates that the VM has not sent or received a packet for a long time, and the NAT mapping entry corresponding to the VM is released in time, thereby saving system resources.
- the first timer is reset.
- the preset time is concurrently sent to the second data center when the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center; in addition, when the VM is migrated from the first data center to the second data center, recorded time of the preset time before the migration is recorded as a first preset time period, and a time remaining after the first preset time period is subtracted from the preset time is recorded as a second preset time period.
- the concurrently sending the preset time to the second data center when the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center is specifically as follows: concurrently sending the preset time, and the first preset time and/or the second preset time to the second data center when the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center.
- the second timer stops recording the preset time in a migration process, and the preset time of 60s and subsequently unrecorded preset time of 40s are sent to the first timer of the second data center (or the preset time of 60s and the recorded preset time of 20s may be sent to the first timer of the second data center, or the preset time of 60s, the recorded preset time of 20s, and subsequently unrecorded preset time of 40s may be sent to the first timer of the second data center); the first timer starts recording from 40s of the preset time; and when the second data center sends or receives a session connection corresponding to the NAT mapping entry, the first timer is reset to 60s.
- the NAT control apparatus sends a release response message to the second data center, so that the second data center deletes the NAT mapping entry.
- actions of the first data center may specifically be executed by the gateway of the first data center
- actions of the second data center may specifically be executed by the gateway of the second data center
- the private network address in the foregoing embodiment may be a private IP address, or a private IP address and a private port number
- the public network address may be a public IP address, or a public IP address and a public port number
- a NAT control apparatus performs centralized control over each data center to properly plan NAT address resources in each data center; meanwhile, the NAT control apparatus records home information of a NAT mapping entry corresponding to the VM, thereby solving a release attack problem caused by a fact that applying and using of the VM are not performed in a same data center.
- An embodiment of the present invention provides a method for network address translation, and as shown in FIG. 2 , the method is applied in a scenario where a virtual machine VM is migrated across data centers and includes the following steps:
- the NAT request message carries the private network address of the first packet sent by the VM.
- the NAT control apparatus allocates a public network address for the private network address according to the NAT request message, establishes the NAT mapping entry according to the private network address and the public network address, records the NAT mapping entry in the network address mapping table, and records home information of the NAT mapping entry as the first data center.
- the NAT mapping entry records a mapping between the private network address and the public network address, and one NAT mapping entry corresponds to one VM, where the private network address is an address specially used on a local area network and cannot be used on a wide area network, and the public network address can be used on a wide area network and can also be used on a local area network.
- the NAT control apparatus sends the NAT mapping entry to the first data center.
- the first data center stores the NAT mapping entry and translates, according to the NAT mapping entry, the private network address of the packet sent by the VM into the public network address.
- the first data center may set a second timer for the NAT mapping entry, and the second timer records a preset time.
- the second timer starts when the first data center does not detect a session connection corresponding to the NAT mapping entry, and stops when the preset time is reached or expires.
- the second timer reaches or exceeds the preset time, it indicates that the VM has not sent or received a packet for a long time, and the NAT mapping entry is released in time, thereby saving system resources.
- the second timer is reset.
- step S201 to step S205 a process that the NAT control apparatus allocates the NAT mapping entry for the first packet sent by the VM and received by the first data center is described.
- An NAT mapping entry does not need to be allocated again for a packet that is subsequently sent by the VM and received by the NAT control apparatus, and the NAT mapping entry is directly used for the packet that is subsequently sent by the VM.
- this embodiment further includes the following steps:
- the NAT control apparatus receives a network address migration message sent by the second data center.
- the network address migration message carries the NAT mapping entry.
- the NAT control apparatus may also receive a network address migration message sent by the first data center.
- a mechanism that the NAT control apparatus receives the network address migration message (the NAT control apparatus receives the network address migration message from the first data center or from the second data center) is preset in a whole system for network address translation.
- the NAT control apparatus sends a verification request message to the first data center.
- step S208 is that the NAT control apparatus sends a verification request message to the second data center.
- the verification request message carries the NAT mapping entry.
- the first data center sends a verification response message to the NAT control apparatus after confirming that the NAT mapping entry is migrated out of the first data center.
- step S209 is that the second data center sends a verification response message to the NAT control apparatus after confirming that the NAT mapping entry is migrated to the second data center.
- the NAT control apparatus updates home information of the NAT mapping entry in a network address mapping table from the first data center to the second data center according to the network address migration message.
- the network address mapping table records the NAT mapping entry and the home information of the NAT mapping entry, and the home information of the NAT mapping entry is updated from the first data center to the second data center, that is, the updated NAT mapping table is homed in the second data center. For details, reference may be made to the description in step S102.
- the NAT control apparatus sends a migration confirmation message to the second data center to confirm that migration of the NAT mapping entry is completed.
- step S211 is that the NAT control apparatus sends a migration confirmation message to the first data center to confirm that migration of the NAT mapping entry is completed.
- this step includes:
- the release request message carries the NAT mapping entry.
- the first timer records the preset time. In a case where the VM does not send or receive a packet in a certain subsequent moment, the first timer starts when the second data center does not detect a session connection corresponding to the NAT mapping entry, and stops when the preset time is reached or expires. When the first timer reaches or exceeds the preset time, it indicates that the VM has not sent or received a packet for a long time, and the NAT mapping entry is released in time, thereby saving system resources.
- the first timer is reset.
- the preset time is concurrently sent to the second data center when the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center; in addition, when the VM is migrated from the first data center to the second data center, recorded time of the preset time before the migration is recorded as a first preset time period, and a time remaining after the first preset time period is subtracted from the preset time is recorded as a second preset time period.
- the concurrently sending the preset time to the second data center when the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center is specifically as follows: concurrently sending the preset time, and the first preset time and/or the second preset time to the second data center when the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center.
- the second timer stops recording the preset time in a migration process, and the preset time of 60s and subsequently unrecorded preset time of 40s are sent to the first timer of the second data center (or the preset time of 60s and the recorded preset time of 20s may be sent to the first timer of the second data center, or the preset time of 60s, the recorded preset time of 20s, and subsequently unrecorded preset time of 40s may be sent to the first timer of the second data center); the first timer starts recording from 40s of the preset time; and when the second data center sends or receives a session connection corresponding to the NAT mapping entry, the first timer is reset to 60s.
- the NAT control apparatus sends a release response message to the second data center.
- the second data center deletes the NAT mapping entry after receiving the release response message.
- the private network address in the foregoing embodiment may be a private IP address, or a private IP address and a private port number
- the public network address may be a public IP address, or a public IP address and a public port number
- actions of the first data center may specifically be executed by a gateway of the first data center
- actions of the second data center may specifically be executed by a gateway of the second data center
- a NAT control apparatus performs centralized control over each data center to properly plan NAT address resources in each data center; meanwhile, the NAT control apparatus records home information of a NAT mapping entry corresponding to the VM, thereby solving a release attack problem caused by a fact that applying and using of the VM are not performed in a same data center.
- An embodiment of the present invention provides a NAT control apparatus 300, configured to implement the foregoing methods in the present invention, and as shown in FIG. 3 , the apparatus is applied in a scenario where a virtual machine VM is migrated across data centers and includes:
- the following three cases where the VM is migrated from the first data center to the second data center mainly exist:
- That the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center may specifically be as follows: An Ncenter triggers a gateway of the first data center to migrate the NAT mapping entry corresponding to the migrated VM to a gateway of the second data center.
- the network address migration message carries the NAT mapping entry, and the NAT mapping entry records a mapping between a private network address and a public network address of the VM, where the private network address can be used only on a local area network and cannot be used on a wide area network, and the public network address can be used on a wide area network and can also be used on a local area network. Therefore, when the VM accesses a wide area network from a local area network, a private network address of a packet that is sent by the VM needs to be translated into a public network address.
- a verifying unit 302 is configured to verify the network address migration message.
- An updating unit 303 is configured to update home information of the NAT mapping entry in a network address mapping table from the first data center to the second data center after the verifying unit 302 successfully verifies the network address migration message.
- the network address mapping table is used to record the NAT mapping entry and the home information of the NAT mapping entry.
- the home information of the NAT mapping entry is updated from the first data center to the second data center, that is, the updated NAT mapping entry is homed in the second data center.
- the migration message receiving unit 301 is specifically configured to, after the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center, receive the network address migration message sent by the first data center; and the verifying unit 302 is specifically configured to verify the network address migration message with the second data center.
- the migration message receiving unit 301 is specifically configured to, after the first data center migrates the NAT mapping entry corresponding to the migrated VM to the second data center, receive the network address migration message sent by the second data center; and the verifying unit 302 is specifically configured to verify the network address migration message with the first data center.
- a mechanism that the NAT control apparatus receives the network address migration message (the NAT control apparatus receives the network address migration message from the first data center or from the second data center) is preset in a whole system for network address translation.
- the NAT control apparatus 300 further includes:
- the NAT request message carries the private network address of the first packet sent by the VM.
- An allocating and recording unit 305 is configured to allocate a public network address for the private network address according to the NAT request message, establish the NAT mapping entry according to the private network address and the public network address, record the NAT mapping entry in the network address mapping table, and record the home information of the NAT mapping entry as the first data center.
- One NAT mapping entry corresponds to one VM.
- a mapping entry sending unit 306 is configured to send the NAT mapping entry to the first data center, so that after storing the NAT mapping entry, the first data center translates, according to the NAT mapping entry, private network addresses of packets (including the first packet and a subsequent packet sent by the VM) sent by the VM into public network addresses.
- the NAT control apparatus 300 further includes:
- the release request message carries the NAT mapping entry.
- the first timer records the preset time. In a case where the VM does not send or receive a packet in a certain subsequent moment, the first timer starts when the second data center does not detect a session connection corresponding to the NAT mapping entry, and stops when the preset time is reached or expires. When the first timer reaches or exceeds the preset time, it indicates that the VM has not sent or received a packet for a long time, and the NAT mapping entry corresponding to the VM is released in time, thereby saving system resources;
- the first timer is reset.
- a release response sending unit 308 is configured to, when it is determined that the home information of the NAT mapping entry is the second data center, where the home information of the NAT mapping entry is recorded in the network address mapping table, send a release response message to the second data center, so that the second data center deletes the NAT mapping entry.
- actions of the first data center may specifically be executed by the gateway of the first data center
- actions of the second data center may specifically be executed by the gateway of the second data center
- the private network address in the foregoing embodiment may be a private IP address, or a private IP address and a private port number
- the public network address may be a public IP address, or a public IP address and a public port number
- the NAT control apparatus performs centralized control over each data center to properly plan NAT address resources in each data center; meanwhile, the NAT control apparatus records home information of a NAT mapping entry corresponding to the VM, thereby solving a release attack problem caused by a fact that applying and using of the VM are not performed in a same data center.
- An embodiment of the present invention provides a system for network address translation, and as shown in FIG. 6 , the system is applied in a scenario where a virtual machine VM is migrated across data centers and includes: a NAT control apparatus 300, a first data center 601, and a second data center 602.
- the first data center 601 is configured to migrate a NAT mapping entry corresponding to a migrated VM to the second data center 602.
- the NAT control apparatus is the NAT control apparatus 300 described in the foregoing embodiments.
- the second data center 602 is configured to receive the NAT mapping entry.
- actions of the first data center may specifically be executed by a gateway of the first data center
- actions of the second data center may specifically be executed by a gateway of the second data center
- NAT control apparatus 300 is applied in the foregoing methods for network address translation, and each unit in the apparatus also corresponds to each step in the methods.
- the NAT control apparatus performs centralized control over each data center to properly plan NAT address resources in each data center; meanwhile, the NAT control apparatus records home information of a NAT mapping entry corresponding to the VM, thereby solving a release attack problem caused by a fact that applying and using of the VM are not performed in a same data center.
- the foregoing program may be stored in a computer readable storage medium. When the program runs, the steps of the foregoing method embodiments are performed.
- the foregoing storage medium includes: any medium that can store program code, such as a ROM, a RAM, a magnetic disk, or an optical disc.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Claims (9)
- Procédé de traduction d'adresse réseau, NAT, appliqué dans un scénario où une machine virtuelle, VM, est migrée entre des centres de données, et comprenant :la réception (101, 207), par un appareil de commande de NAT, d'un message de migration d'adresse réseau après qu'un premier centre de données migre une entrée de mise en correspondance de NAT correspondant à une machine VM migrée sur un second centre de données, et la vérification du message de migration d'adresse réseau, le message de migration d'adresse réseau incluant l'entrée de mise en correspondance de NAT, et l'entrée de mise en correspondance de NAT enregistrant une mise en correspondance entre une adresse de réseau privée et une adresse de réseau publique de la machine VM ; etl'actualisation (102, 210) d'informations de rattachement de l'entrée de mise en correspondance de NAT dans une table de mise en correspondance d'adresses réseau du premier centre de données avec le second centre de données en fonction du message de migration d'adresse réseau après que l'appareil de commande de NAT vérifie correctement le message de migration d'adresse réseau ; dans lequel la table de mise en correspondance d'adresses réseau est utilisée pour enregistrer l'entrée de mise en correspondance de NAT et les informations de rattachement de l'entrée de mise en correspondance de NAT ; dans lequel :la réception (207), par un appareil de commande de NAT, d'un message de migration d'adresse réseau comprend : la réception, par l'appareil de commande de NAT, du message de migration d'adresse réseau envoyé par le premier centre de données ; et la vérification du message de migration d'adresse réseau comprend : l'envoi (208) par l'appareil de commande de NAT d'un message de requête de vérification au second centre de données et la réception (209) par l'appareil de commande de NAT d'un message de réponse de vérification provenant du second centre de données après la confirmation que l'entrée de mise en correspondance de NAT est migrée sur le second centre de données ;oula réception (207), par un appareil de commande de NAT, d'un message de migration d'adresse réseau consiste spécifiquement en : la réception, par l'appareil de commande de NAT, du message de migration d'adresse réseau envoyé par le second centre de données, et la vérification du message de migration d'adresse réseau consiste spécifiquement en : l'envoi (208) par l'appareil de commande de NAT d'un message de requête de vérification au premier centre de données et la réception (209) par l'appareil de commande de NAT d'un message de réponse de vérification provenant du le premier centre de données après la confirmation que l'entrée de mise en correspondance de NAT est migrée hors du premier centre de données.
- Procédé selon la revendication 1, comprenant en outre : après que le premier centre de données reçoit un premier paquet qui inclut une adresse de réseau privée et est envoyé par la machine VM :la réception (202), par l'appareil de commande de NAT, d'un message de requête de NAT envoyé par le premier centre de données, le message de requête de NAT incluant l'adresse de réseau privée du paquet ;l'attribution (203) d'une adresse de réseau publique pour l'adresse de réseau privée en fonction du message de requête de NAT, l'établissement de l'entrée de mise en correspondance de NAT en fonction de l'adresse de réseau privée et de l'adresse de réseau publique, l'enregistrement de l'entrée de mise en correspondance de NAT dans la table de mise en correspondance d'adresses réseau, et l'enregistrement des informations de rattachement de l'entrée de mise en correspondance de NAT comme premier centre de données ; etl'envoi (204) de l'entrée de mise en correspondance de NAT au premier centre de données, de telle sorte qu'après la mémorisation de l'entrée de mise en correspondance de NAT, le premier centre de données traduise, en fonction de l'entrée de mise en correspondance de NAT, l'adresse de réseau privée du paquet envoyé par la machine VM en l'adresse de réseau publique.
- Procédé selon la revendication 2, comprenant en outre, après l'actualisation d'informations de rattachement de l'entrée de mise en correspondance de NAT dans une table de mise en correspondance d'adresses réseau du premier centre de données avec le second centre de données en fonction du message de migration d'adresse réseau :la réception (212) d'un message de requête de libération qui est envoyé par le second centre de données quand une première temporisation correspondant à l'entrée de mise en correspondance de NAT atteint ou dépasse un temps préétabli, le message de requête de libération incluant l'entrée de mise en correspondance de NAT ; etquand il est déterminé que les informations de rattachement de l'entrée de mise en correspondance de NAT correspondent au second centre de données, les informations de rattachement de l'entrée de mise en correspondance de NAT étant enregistrées dans la table de mise en correspondance d'adresses réseau, l'envoi d'un message de réponse de libération au second centre de données, de telle sorte que le second centre de données supprime l'entrée de mise en correspondance de NAT.
- Procédé selon l'une quelconque des revendications 1 à 3, dans lequel
l'adresse de réseau privée comprend : une adresse IP privée, ou une adresse IP privée et un numéro de port privé ; et
l'adresse de réseau publique comprend : une adresse IP publique, ou une adresse IP publique et un numéro de port public. - Appareil de commande de traduction d'adresse réseau, NAT, appliqué dans un scénario où une machine virtuelle, VM, est migrée entre des centres de données, et comprenant :une unité de réception de message de migration (301), configurée pour recevoir un message de migration d'adresse réseau après qu'un premier centre de données migre une entrée de mise en correspondance de NAT correspondant à une machine VM migrée sur un second centre de données, le message de migration d'adresse réseau incluant l'entrée de mise en correspondance de NAT, et l'entrée de mise en correspondance de NAT enregistrant une mise en correspondance entre une adresse de réseau privée et une adresse de réseau publique de la machine VM ;une unité de vérification (302), configurée pour vérifier le message de migration d'adresse réseau ; etune unité d'actualisation (303), configurée pour actualiser des informations de rattachement de l'entrée de mise en correspondance de NAT dans une table de mise en correspondance d'adresses réseau du premier centre de données avec le second centre de données en fonction du message de migration d'adresse réseau après que l'unité de vérification vérifie correctement le message de migration d'adresse réseau, dans lequel la table de mise en correspondance d'adresses réseau est utilisée pour enregistrer l'entrée de mise en correspondance de NAT et les informations de rattachement de l'entrée de mise en correspondance de NAT ;dans lequel :l'unité de réception de message de migration (301) est configurée spécifiquement pour, après que le premier centre de donnée migre l'entrée de mise en correspondance de NAT correspondant à la machine VM migrée sur le second centre de données, recevoir le message de migration d'adresse réseau envoyé par le premier centre de données ; et l'unité de vérification (302) est configurée spécifiquement pour envoyer un message de requête de vérification au second centre de données et recevoir un message de réponse de vérification provenant du second centre de données après la confirmation que l'entrée de mise en correspondance de NAT est migrée sur le second centre de données ;oul'unité de réception de message de migration (301) est configurée spécifiquement pour, après que le premier centre de données migre l'entrée de mise en correspondance de NAT correspondant à la machine VM migrée sur le second centre de données, recevoir le message de migration d'adresse réseau envoyé par le second centre de données ; et l'unité de vérification (302) est configurée spécifiquement pour envoyer un message de requête de vérification au premier centre de données et recevoir un message de réponse de vérification provenant du premier centre de données après la confirmation que l'entrée de mise en correspondance de NAT est migrée hors du premier centre de données.
- Appareil selon la revendication 5, comprenant en outre :une unité de réception de requête de NAT (304), configurée pour, après que le premier centre de données reçoit un premier paquet qui inclut une adresse de réseau privée et est envoyé par la machine VM, recevoir un message de requête de NAT envoyé par le premier centre de données, le message de requête de NAT incluant l'adresse de réseau privée du paquet ;une unité d'attribution et d'enregistrement (305), configurée pour attribuer une adresse de réseau publique pour l'adresse de réseau privée en fonction du message de requête de NAT, établir l'entrée de mise en correspondance de NAT en fonction de l'adresse de réseau privée et de l'adresse de réseau publique, enregistrer l'entrée de mise en correspondance de NAT dans la table de mise en correspondance d'adresses réseau, et enregistrer les informations de rattachement de l'entrée de mise en correspondance de NAT comme premier centre de données ; etune unité d'envoi d'entrée de mise en correspondance (306), configurée pour envoyer l'entrée de mise en correspondance de NAT au premier centre de données, de telle sorte qu'après la mémorisation de l'entrée de mise en correspondance de NAT, le premier centre de données traduise, en fonction de l'entrée de mise en correspondance de NAT, l'adresse de réseau privée du paquet envoyé par la machine VM en l'adresse de réseau publique.
- Appareil selon la revendication 6, comprenant en outre :une unité de réception de requête de libération (307), configurée pour, après l'actualisation par l'unité d'actualisation des informations de rattachement de l'entrée de mise en correspondance de NAT dans la table de mise en correspondance d'adresses réseau du premier centre de données avec le second centre de données en fonction du message de migration d'adresse réseau, recevoir un message de requête de libération qui est envoyé par le second centre de données quand une première temporisation correspondant à l'entrée de mise en correspondance de NAT atteint ou dépasse un temps préétabli, le message de requête de libération incluant l'entrée de mise en correspondance de NAT ; etune unité d'envoi de réponse de libération (308), configurée pour, quand il est déterminé que les informations de rattachement de l'entrée de mise en correspondance de NAT correspondent au second centre de données, les informations de rattachement de l'entrée de mise en correspondance de NAT étant enregistrées dans la table de mise en correspondance d'adresses réseau, envoyer un message de réponse de libération au second centre de données, de telle sorte que le second centre de données supprime l'entrée de mise en correspondance de NAT.
- Appareil selon l'une quelconque des revendications 5 à 7, dans lequel l'adresse de réseau privée est spécifiquement : une adresse IP privée, ou une adresse IP privée et un numéro de port privé ; et
l'adresse de réseau publique est spécifiquement : une adresse IP publique, ou une adresse IP publique et un numéro de port public. - Système de traduction d'adresse réseau, NAT, appliqué dans un scénario où une machine virtuelle, VM, est migrée entre des centres de données, et comprenant un appareil de commande de NAT, un premier centre de données, et un second centre de données, dans lequel :le premier centre de données est configuré pour migrer une entrée de mise en correspondance de NAT correspondant à une machine VM migrée sur le second centre de données ;l'appareil de commande de NAT est l'appareil de commande de NAT selon l'une quelconque des revendications 5 à 8 ; etle second centre de données est configuré pour recevoir l'entrée de mise en correspondance de NAT.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210126776.9A CN103379185B (zh) | 2012-04-26 | 2012-04-26 | 一种网络地址转换的方法、设备和系统 |
PCT/CN2012/085040 WO2013159511A1 (fr) | 2012-04-26 | 2012-11-22 | Procédé, dispositif et système de traduction d'adresse réseau |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2797295A1 EP2797295A1 (fr) | 2014-10-29 |
EP2797295A4 EP2797295A4 (fr) | 2015-01-28 |
EP2797295B1 true EP2797295B1 (fr) | 2016-02-03 |
Family
ID=49463737
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12875063.5A Not-in-force EP2797295B1 (fr) | 2012-04-26 | 2012-11-22 | Procédé, dispositif et système de traduction d'adresse réseau |
Country Status (4)
Country | Link |
---|---|
US (1) | US9515987B2 (fr) |
EP (1) | EP2797295B1 (fr) |
CN (1) | CN103379185B (fr) |
WO (1) | WO2013159511A1 (fr) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3094066B1 (fr) * | 2014-01-14 | 2020-10-07 | Huawei Technologies Co., Ltd. | Procédé et appareil de translation d'adresse de réseau |
US9635114B2 (en) * | 2014-01-24 | 2017-04-25 | Netapp, Inc. | Externally initiated application session endpoint migration |
GB2525434A (en) | 2014-04-25 | 2015-10-28 | Ibm | Method and device for duplicating a data center |
US9723065B2 (en) * | 2014-10-13 | 2017-08-01 | Vmware, Inc. | Cross-cloud object mapping for hybrid clouds |
CN105704045B (zh) | 2014-11-26 | 2019-05-28 | 华为技术有限公司 | 数据中心网关间虚拟机位置信息同步的方法、网关及系统 |
CN104836849B (zh) * | 2015-04-16 | 2018-02-09 | 新华三技术有限公司 | 一种注册虚拟机方法和装置 |
US20160373405A1 (en) * | 2015-06-16 | 2016-12-22 | Amazon Technologies, Inc. | Managing dynamic ip address assignments |
WO2017214856A1 (fr) * | 2016-06-14 | 2017-12-21 | Intellectual Ventures Hong Kong Limited | Atténuation d'attaques par canal caché inter-vm |
US10419393B2 (en) * | 2017-05-11 | 2019-09-17 | International Business Machines Corporation | Using network configuration analysis to improve server grouping in migration |
EP3493058A1 (fr) * | 2017-12-04 | 2019-06-05 | Thomson Licensing | Procédé et dispositif de migration d'une fonction à paquets |
US10601679B2 (en) | 2017-12-26 | 2020-03-24 | International Business Machines Corporation | Data-centric predictive container migration based on cognitive modelling |
US11157630B2 (en) * | 2018-05-07 | 2021-10-26 | Salesforce.Com, Inc. | Migrating data between databases |
US10819677B2 (en) * | 2018-07-16 | 2020-10-27 | Amazon Technologies, Inc. | Address migration service |
US11265243B2 (en) * | 2018-07-31 | 2022-03-01 | Vmware, Inc. | Support for multi-AZ management appliance networking |
EP3672159A1 (fr) * | 2018-12-19 | 2020-06-24 | Orange | Dispositif et procédé de connectivité d'internet des objets |
CN109862088B (zh) * | 2019-01-23 | 2021-06-08 | 新华三云计算技术有限公司 | Tcp连接迁移方法及装置 |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7042876B1 (en) * | 2000-09-12 | 2006-05-09 | Cisco Technology, Inc. | Stateful network address translation protocol implemented over a data network |
US20020116532A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating an information packet and identifying a data structure |
US20020116397A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating an information packet through multiple router devices |
US7155518B2 (en) * | 2001-01-08 | 2006-12-26 | Interactive People Unplugged Ab | Extranet workgroup formation across multiple mobile virtual private networks |
US7280557B1 (en) * | 2002-06-28 | 2007-10-09 | Cisco Technology, Inc. | Mechanisms for providing stateful NAT support in redundant and asymetric routing environments |
US7848767B2 (en) * | 2002-10-15 | 2010-12-07 | Tekelec | Methods and systems for migrating between application layer mobile signaling protocols |
US7484208B1 (en) * | 2002-12-12 | 2009-01-27 | Michael Nelson | Virtual machine migration |
US8069218B1 (en) * | 2003-05-05 | 2011-11-29 | Parallels Holdings, Ltd. | System, method and computer program product for process migration with planned minimized down-time |
US7606929B2 (en) * | 2003-06-30 | 2009-10-20 | Microsoft Corporation | Network load balancing with connection manipulation |
US7453852B2 (en) * | 2003-07-14 | 2008-11-18 | Lucent Technologies Inc. | Method and system for mobility across heterogeneous address spaces |
US7257811B2 (en) * | 2004-05-11 | 2007-08-14 | International Business Machines Corporation | System, method and program to migrate a virtual machine |
US8429630B2 (en) * | 2005-09-15 | 2013-04-23 | Ca, Inc. | Globally distributed utility computing cloud |
US7818454B2 (en) * | 2005-09-15 | 2010-10-19 | Hostway Corporation | Host migration system |
US7606191B1 (en) * | 2006-05-01 | 2009-10-20 | Sprint Spectrum L.P. | Methods and systems for secure mobile-IP traffic traversing network address translation |
US7840683B2 (en) * | 2006-08-31 | 2010-11-23 | Sap Ag | Systems and methods of migrating sessions between computer systems |
US8144709B2 (en) * | 2007-04-06 | 2012-03-27 | International Business Machines Corporation | Method, system and computer processing an IP packet, routing a structured data carrier, preventing broadcast storms, load-balancing and converting a full broadcast IP packet |
US9678803B2 (en) * | 2007-06-22 | 2017-06-13 | Red Hat, Inc. | Migration of network entities to a cloud infrastructure |
US8938489B2 (en) * | 2007-06-22 | 2015-01-20 | Red Hat, Inc. | Monitoring system performance changes based on configuration modification |
US8166205B2 (en) * | 2007-07-31 | 2012-04-24 | Cisco Technology, Inc. | Overlay transport virtualization |
CN101383757B (zh) * | 2007-09-03 | 2012-03-21 | 华为技术有限公司 | 组播路由方法、装置及系统、媒体网关和媒体网关控制器 |
CN101552803B (zh) | 2008-04-03 | 2011-10-05 | 华为技术有限公司 | 网络地址转换地址映射表维护方法、媒体网关及其控制器 |
CN101729388B (zh) * | 2008-10-22 | 2012-01-25 | 华为技术有限公司 | 一种实现网络地址转换的方法、媒体网关和网络系统 |
JP2010114665A (ja) * | 2008-11-06 | 2010-05-20 | Toshiba Corp | 通信データ制御方法及び計算機システム |
CN101834831A (zh) * | 2009-03-13 | 2010-09-15 | 华为技术有限公司 | 一种实现nat设备冗余备份的方法、装置和系统 |
US8146082B2 (en) * | 2009-03-25 | 2012-03-27 | Vmware, Inc. | Migrating virtual machines configured with pass-through devices |
US8429647B2 (en) * | 2009-05-06 | 2013-04-23 | Vmware, Inc. | Virtual machine migration across network by publishing routes to the associated virtual networks via virtual router after the start of migration of the virtual machine |
US8458284B2 (en) * | 2009-06-12 | 2013-06-04 | International Business Machines Corporation | Systems and methods for efficient live application migration within bandwidth constrained networks |
CN102714651B (zh) * | 2009-07-01 | 2015-11-25 | 太阳涡轮股份有限公司 | 第一计算机网络与至少一个第二扩展计算机网络连接方法 |
US9083587B2 (en) * | 2009-08-21 | 2015-07-14 | Cisco Technology, Inc. | Port chunk allocation in network address translation |
US8520615B2 (en) * | 2010-03-26 | 2013-08-27 | Juniper Networks, Inc. | Breakout gateway for mobile data traffic |
JP5190084B2 (ja) * | 2010-03-30 | 2013-04-24 | 株式会社日立製作所 | 仮想マシンのマイグレーション方法およびシステム |
CN104396192B (zh) * | 2010-06-29 | 2018-03-06 | 华为技术有限公司 | 不对称网络地址封装 |
US8423646B2 (en) * | 2010-07-09 | 2013-04-16 | International Business Machines Corporation | Network-aware virtual machine migration in datacenters |
US8484653B2 (en) * | 2010-07-28 | 2013-07-09 | Red Hat Israel, Ltd. | Mechanism for delayed hardware upgrades in virtualization systems |
US8826292B2 (en) * | 2010-08-06 | 2014-09-02 | Red Hat Israel, Ltd. | Migrating virtual machines based on level of resource sharing and expected load per resource on candidate target host machines |
US8533713B2 (en) * | 2011-03-29 | 2013-09-10 | Intel Corporation | Efficent migration of virtual functions to enable high availability and resource rebalance |
US8837483B2 (en) | 2011-04-11 | 2014-09-16 | Alcatel Lucent | Mapping private and public addresses |
CN102185774A (zh) * | 2011-05-10 | 2011-09-14 | 中兴通讯股份有限公司 | 虚拟机无缝迁移的方法、管理器及系统 |
CN102164091B (zh) * | 2011-05-13 | 2015-01-21 | 北京星网锐捷网络技术有限公司 | 一种mac地址表建立方法及运营商边缘设备 |
US8769058B1 (en) * | 2011-06-30 | 2014-07-01 | Emc Corporation | Provisioning interfacing virtual machines to separate virtual datacenters |
US8813074B2 (en) * | 2011-08-05 | 2014-08-19 | Vmware, Inc. | Detecting and correcting network interruptions using network address translation |
EP3605969B1 (fr) * | 2011-08-17 | 2021-05-26 | Nicira Inc. | Routage l3 logique distribué |
US8867403B2 (en) * | 2011-08-18 | 2014-10-21 | International Business Machines Corporation | Virtual network overlays |
US8694644B2 (en) * | 2011-09-29 | 2014-04-08 | Nec Laboratories America, Inc. | Network-aware coordination of virtual machine migrations in enterprise data centers and clouds |
US8863141B2 (en) * | 2011-12-14 | 2014-10-14 | International Business Machines Corporation | Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost history |
US9088584B2 (en) * | 2011-12-16 | 2015-07-21 | Cisco Technology, Inc. | System and method for non-disruptive management of servers in a network environment |
-
2012
- 2012-04-26 CN CN201210126776.9A patent/CN103379185B/zh active Active
- 2012-11-22 WO PCT/CN2012/085040 patent/WO2013159511A1/fr active Application Filing
- 2012-11-22 EP EP12875063.5A patent/EP2797295B1/fr not_active Not-in-force
-
2014
- 2014-09-09 US US14/481,149 patent/US9515987B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2797295A4 (fr) | 2015-01-28 |
CN103379185A (zh) | 2013-10-30 |
US9515987B2 (en) | 2016-12-06 |
CN103379185B (zh) | 2016-08-03 |
WO2013159511A1 (fr) | 2013-10-31 |
EP2797295A1 (fr) | 2014-10-29 |
US20150012665A1 (en) | 2015-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2797295B1 (fr) | Procédé, dispositif et système de traduction d'adresse réseau | |
US9846591B2 (en) | Method, device and system for migrating configuration information during live migration of virtual machine | |
US11418512B2 (en) | Method for virtual machine to access physical server in cloud computing system, apparatus, and system | |
CN106713406B (zh) | 接入切片网络的方法及系统 | |
US9887959B2 (en) | Methods and system for allocating an IP address for an instance in a network function virtualization (NFV) system | |
CN102025798B (zh) | 地址分配处理方法、装置和系统 | |
US9479611B2 (en) | Method, device, and system for implementing communication after virtual machine migration | |
CN103581324B (zh) | 一种云计算资源池系统及其实现方法 | |
EP2999194A1 (fr) | Procédé et appareil permettant à un dispositif d'accéder à un réseau | |
CN103607430A (zh) | 一种网络处理的方法和系统及网络控制中心 | |
KR101320962B1 (ko) | 네트워크 어드레스 변환을 위한 관리 방법 및 관리 장치 | |
US10110684B1 (en) | Transparent network service migration across service devices | |
CN105979202B (zh) | 一种数据传输方法及装置 | |
CN111327668A (zh) | 网络管理方法、装置、设备和存储介质 | |
US10419392B2 (en) | Method, device and system for implementing address sharing | |
US20150372854A1 (en) | Communication control device, communication control program, and communication control method | |
CN107342972A (zh) | 一种实现远程访问的方法及装置 | |
CN113014680A (zh) | 一种宽带接入的方法、装置、设备和存储介质 | |
JP6013980B2 (ja) | アドレス割当装置およびアドレス割当プログラム | |
KR101842830B1 (ko) | M2M 플랫폼에서 Request Reachability 관리 방법 | |
KR20160050896A (ko) | 가상화 기반 접속 컨트롤러 생성 방법 및 이를 지원하는 통합 관리 서버 | |
CN115185699A (zh) | 提供商网络服务扩展 | |
CN104754656A (zh) | 实现增加终端可用端口的方法、接入服务路由器及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140603 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20150109 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/12 20060101AFI20141223BHEP |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
DAX | Request for extension of the european patent (deleted) | ||
INTG | Intention to grant announced |
Effective date: 20150716 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 774138 Country of ref document: AT Kind code of ref document: T Effective date: 20160215 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602012014595 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D Ref country code: NL Ref legal event code: MP Effective date: 20160203 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 774138 Country of ref document: AT Kind code of ref document: T Effective date: 20160203 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160503 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160504 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160603 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160603 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 5 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602012014595 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
26N | No opposition filed |
Effective date: 20161104 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160503 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161130 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161130 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161130 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161122 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20121122 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161122 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 7 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160203 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602012014595 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0029120000 Ipc: H04L0067286900 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20220930 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20221010 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20220621 Year of fee payment: 11 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602012014595 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20231122 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20240601 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231122 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231130 |